SlideShare uma empresa Scribd logo
1 de 22
Security Solutions For The 21st Century
__________
2
Advanced Access
Security specializes in
card access control
security and
monitoring for every
level of need. From a
one door small
business to an
enterprise system with
multiple locations,
thousands of
employees, and the
need for
customization - we
can meet all of your
security system needs.
Advanced Access
state of the art
software and
hardware enables the
highest level of
customization and
convenience for our
clients.
Advanced Access'
management team
and access control
system has been
providing card access
control systems and
security door
solutions for an
impressive array of
businesses and
organizations for the
past 30 years.
Our Story…
3
OUR SYSTEM
Advanced Access’ system is a complete,
enterprise-class access control and security
management solution that offers
unsurpassed ability to satisfy the
requirements of any credential management,
access control, or security situation. With a
user interface that’s easy to operate and
system features that deploy in any
combination, Advanced Access easily fits the
needs of any customer.
4
Flexible Platform: Advanced
Access’ system offers a
solution that is appropriate
for any organization,
including business,
commercial, industrial
government, healthcare,
education, transportation,
and more.
Scalable Architecture:
Whether you need a self-
contained or distributed
system, Advanced Access
scales to any size, making it
ideal for single or multi-site
facilities, remote sites,
campus settings, and multi-
national organizations.
Complete Solution: Our
system offers a complete
selection of in-demand
features that integrate with
standard and emerging
technologies. You can deploy
any combination of features:
access control, alarm/event
monitoring, intrusion
detection, surveillance,
elevator control, identification
& credential management,
photo imaging & badging,
visitor management,
reporting, and more.
5
Sustainable Future: Our forward-thinking
design and commitment to sustainability means
that allows Advanced Access’ customers to meet
today’s challenges and expand as future needs
arise. By maintaining long-term compatibility
with existing technologies and keeping pace with
rapid industry advancements, Advanced Access
system provides a continuous path forward.
Maximum Investment: Advanced Access’
system is a single-platform solution that can
secure an entire facility. Choose the features
you want now and implement additional features
as your needs change. With Advanced Access,
you are never locked into one decision, and you
don’t need to discard major components when
your system expands.
6
Protecting People, Assets, and AssistingWith Crisis
Management
Well Trained Staff
Experience
Expertise and Innovation
Repeatability of Success
Robust Systems
Experience
Expertise and Innovation
Repeatability of Success
24/7 Operation
Proven Processes
Continuous Improvement
Extensive StaffTraining
7
Our Major Services
Managed Access
Control Services
Alarm Monitoring
Services
Managed Video
Services
Emergency
Management Services
8
Enhancing Situational Awareness For Clients with Our
Integrated Product Suite
Product Functionality Action
Access Control Alarm Coordination Alert Client
Hosted Video
Surveillance
Real-Time Recordings Documented Evidence
Emergency Management Client Safety Immediate Response
8000-0031 9
Monitor
•User Friendly: Easy to monitor
and evaluate situations with
informative, color-coded
messages, and prioritized alarm
events. Advanced Access’
Operators can quickly respond to
alarms and events.
•Who’s In: This feature provides
a real-time log of the cardholders
in your facility or in a designated
area. This provides a roll call
report that is easily printed or
viewed, helping the customer
determine the status of persons.
•Intrusion Detections:
Monitor user-defined alarm points
for security notification purposes.
•Guard Tour: Track guard tour
points by sequence, start/stop
time, or by timed intervals.
Detect
•Device Status: Quickly
determine the state of a device or
door with dynamic text and
graphic indicators. Command
doors and devices through
interactive command menus.
•Email Notification: Selectively
notify the appropriate personnel
of alarms and activity. Advanced
Access’ automated email
notification feature sends selected
events or alarms to appropriate
personnel.
•Photo Verification:
Automatically call up a stored
photo of the person presenting
credentials for direct comparison
by the customer, adding yet
another level of security for your
organization.
Respond
•Door Commander: Control a
single door or a group of doors
with the click of a mouse. Our
staff or the customer can
interactively override a lock or
unlock-schedule, disable and
pulse doors from context menus.
•Alarm Point: All authorized
personnel will have point-and-
click control of alarm partitions,
arm and disarm partitions,
acknowledge and shunt incoming
messages, and more.
•Elevator Control: Call elevator
cars and authorize access to
selected floors, based on access
privileges.
•Door Properties: Utilize the
Apple/Samsung phone application
to pulse doors and override door
lock & unlock schedules.
10
ONE.COMPREHENSIVE.
SOLUTION. Mobile Application (iPhone & Android)
Access Level Management
Alarm Monitoring
Elevator Monitoring
24/7 Emergency Assistance & Problem Reporting
Card Administration
Full Reporting Capability & Hosted History
Custom Reports
Software Upgrades Included
8000-0031 11
Import
•Import / Export: Our system
provides time-saving tools that
simplify the task of importing
people and cards into the
Advanced Access database.
Advanced Access can import and
export data to and from personnel
systems including SAP, Peoplesoft,
and Man Power.
•Personal Doors: Allows people
to be independently assigned to
doors when a unique set of
privileges is needed. Use in
communication with access
groups and profiles to quickly add
doors to a cardholder, or use the
feature by itself to provide the
simplest access privilege. This
includes a convenient filtering
utility that lets us and the client
quickly locate the right door no
matter how large your facility is.
Schedule
•Schedules: A click-and-drag
interface with color coded time
intervals makes creating a time
schedule easy to understand and
do. Special days and holidays can
be assigned to any schedule, and
they can be uniquely configured
with their own active/inactive
times.
•Time & Attendance:
Advanced Access’ time &
attendance feature reports
personnel attendance and hours
worked in any size organization.
•Access Rules: Advanced
Access provides the ultimate
flexibility in creating simple or
complex access rules. Apply them
to doors or personnel in a
grouped or individual manner.
Control
•Cardholders: Extensive user-
intuitive options for enrolling and
managing cardholders and their
credentials. You can enroll
multiple cards and biometric
credentials for each cardholder.
Independently control card
behaviors and access privileges.
It’s easy to add photographs,
badges, and data that pertain to
each cardholder and their role
within your organization. We
provide numerous data types that
make it simple to manage
credentials and access privileges,
as well as control report filtering.
•Reports: Track personnel and
operator activity with our
extensive selection of reports.
These include alarm, door/card
activity, who’s-in/roll-call,
auditing and many more.
12
CuttingEdge
Technology
100% Web Based
Smart Phone App (iPhone & Android): Control Your Facility From Anywhere In The World
Easy-To-Use
Biometric Integration
Smart-Card Support
Easily Customized
Customized Card Access Control
CCTV and IP-Cameras
Real-Time Facility Alarm via Digital Map
Mass Notification Integration
Crisis Mode Customization Options
Wireless Door and Motion Detection Integration
13
Filter
•Authorized Personnel
Privileges: Advanced Access
offers a rich set of filters and
privileges that can be assigned in
any combination. You can easily
control which screens and features
each authorized personnel can see
or use an individual basis. This
way can create unique boundaries
for authorized personnel who
serve different roles and ranks;
like property managers, security
officers, badging operators, and
any other authorized personnel.
Also you can manage login and
password renewals with finite
control.
Manage
•Credential Management:
Advanced Access offers a versatile
credentialing solution that
combines card enrollment,
biometric identification, photo-
capture & ID badging, and visitor
management capabilities. Provide
the added security and safety your
organization desires by choosing
from any combination of
credentialing features.
Grow
•Scalability: Most card access
systems are relatively simple to
program and operate, until the
number of readers reaches 8 to 10,
or beyond. Once that barrier has
been reached, many of the of the
other systems become sluggish in
their operation and much more
cumbersome to program, such as
assigning cards to specific readers
at specific times of operation. Our
system design allows a 300-reader
system to be as easy to program as
a 3-reader system.
14
Product Capabilities…
Security
Access Control
Duress
Intrusion
Surveillance
Alarms and Alerts
Cardholder
Management
Badge Design & Printing
Mass Notification
Intercoms
Reporting
Facility
Asset Tracking
Scheduling
Mass Notification
Maintenance Reporting
Special Features
High Speed Operation
Remote Access
Mobile Access (Smart
Phone Apps
Ease of Use
Ease of Configuration
Email, Text and Phone
Notification
User Administration
15
Capture
•Photo Imaging & Badging:
Create professional, durable ID
Cards and badges using any
combination of graphics, logos,
photos and data. Customize
badge designs to distinguish
between employees, vendors,
visitors, etc.
•Visitor Management:
Advanced Access’ visitor
management feature allows clients
to verify, screen, and badge
visitors to their facility. The
system performs live background
checks, directory linking, and
versatile e-mail capabilities.
Design
•Card/Badge Enrollment:
Advanced Access performs card
enrollment, credential
management, and badge printing
from the same screen.
•Log-on Security &
Authorized Personnel
Privileges: The Access web-client
authentication logon based on the
same privileges and operator
filters as the Advanced Access
server, offering the ability to hide,
view, and edit system data based
on individual logons.
Identify
•Biometric Enrollment:
Advanced Access integrates fully
with the foremost biometric
technologies, providing the
capability to capture, compare,
encode, and load finger templates
within the Advanced Access
system. Advanced Access provides
any combination of identification
and authentication, and is able to
store biometric data in the reader
and/or on the smart card.
•Photo Dossier: This feature
allows authorized personnel to pull
the latest cardholder data along
with stored photos and
demographic information in a
quick and consolidated form for
viewing or printing.
16
Why Advanced Access?
Access
excellence offers
peace of mind
Total security
solution bundled
into one, easy to
manage package
Convenient
hand-held
solutions to
make
monitoring,
detecting, and
reacting simple
and efficient
Support team
committed to
bringing you
unparalleled
customer service
and a personal
relationship with
our clients
17
Why Advanced Access?
Our 100% web based, virus-proof software utilizes
a secure filtering environment in its Web server,
which is impervious to viruses because of its
internal design. It is resistant to hackers because
of enhanced security measures built into the filter
and the proprietary nature of the filter itself -
factors that are significant when analyzing network
and system security. In addition, our software is
very stable; systems failure rates are infinitesimal,
when compared to typical Windows® based
platforms.
•Our Interactive Facility Mapping software
has a powerful interface allowing a system
user to access a facility map from a PC or
even a smartphone to control access
points (secured doors/windows) and
watch surveillance cameras.
18
Why Advanced Access?
Advanced Access system was established to bring innovative solutions to the
security market. Since, 1984, our system has maintained an unwavering
commitment to excellence in developing access control and security management
solutions that seamlessly integrate with advancing technology from leading
industry partners. Dedication to product development is only part of the business
philosophy at Advanced Access. All Advanced Access products are manufactured
in the United States to rigorous military standards for the utmost quality and
reliability. Advanced Access also offers total support to its customers through an
extensive network of highly trained technicians.
Corporate Commitment to Excellence
19
Team Capabilities Include:
•Design & Build
Customization
•Needs Analysis
•Program/Project
Management
•Project Engineering
•Training
•Value Engineering
Hardware & Software Design
Capabilities:
•Product Design
•Backward Compatibility
•Obsolescence Management
•Design Verification Testing
•Manufacturing
•Manufacturing Test
•Documentation
•Implementation
•Support
Capabilities
20
A Track Record of Success
• Our Equipment and Software designed by our team has
been in the field for over 30 years, and installed in
hundreds of facilities in the continental US and
overseas.
• Equipment has been in the field for over 10 years
without failure or replacement.
• Advanced Access’ System is used in mission-critical
solutions in the Federal Government, Top Secret
Facilities, Public Schools, Universities, and DOD Clients.
• Advanced Access’ products are designed to exceed UL,
approval, and other agency approvals.
SUPPORTED TECHNOLOGES INCLUDE:
21
Standard Cards
Proximity 125KHz
Barcode
Magnetic Stripe
Smart Cards
HID iClass
MIFARE
MIFARE DESFire
MIFARE DESFire EVI
US Government Compliant
HSPD-12 & FIPS 201
Compliant
FICAM Approved APL
Certification Number 10060
PIV, PIV-II, TWIC cards
CAC-Legacy, Transition,
Endpoint
Option to perform PKI
challenge to the Personal
Certificate (PAK)
Advanced Access Would Like To
Thank You For Your Time and
Consideration!
Please visit us at
22

Mais conteúdo relacionado

Mais procurados (20)

Barrister Overview - Call Center Services
Barrister Overview - Call Center ServicesBarrister Overview - Call Center Services
Barrister Overview - Call Center Services
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business Applications
 
interface 9 features
interface 9 featuresinterface 9 features
interface 9 features
 
Employee Training Management System
Employee Training Management SystemEmployee Training Management System
Employee Training Management System
 
Hotel Management System
Hotel Management System Hotel Management System
Hotel Management System
 
Early-warning system on SAP Compliance issues
Early-warning system on SAP Compliance issuesEarly-warning system on SAP Compliance issues
Early-warning system on SAP Compliance issues
 
Mobile device management
Mobile device managementMobile device management
Mobile device management
 
VBOT
VBOTVBOT
VBOT
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Early-warning Alerts on SAP issues
Early-warning Alerts on SAP issues Early-warning Alerts on SAP issues
Early-warning Alerts on SAP issues
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
web based speed age courier
web based speed age courierweb based speed age courier
web based speed age courier
 
Web based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management systemWeb based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management system
 
C.V-Ezzat-mohamed
C.V-Ezzat-mohamedC.V-Ezzat-mohamed
C.V-Ezzat-mohamed
 
Vms
VmsVms
Vms
 
Early warning system on SAP FICO issues
Early warning system on SAP FICO issues Early warning system on SAP FICO issues
Early warning system on SAP FICO issues
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 

Semelhante a 21st Century Security Solutions in 40 Characters

Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Plc .
 
Planning for a successful access control system installation
Planning for a successful access control system installationPlanning for a successful access control system installation
Planning for a successful access control system installationUmbrella Technologies
 
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfEnsure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfmagePoint
 
ONI_DatasheetRedesign_AssureMonitor_v3 (2)
ONI_DatasheetRedesign_AssureMonitor_v3 (2)ONI_DatasheetRedesign_AssureMonitor_v3 (2)
ONI_DatasheetRedesign_AssureMonitor_v3 (2)Carl Pollard
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 
Choose the Best Quality Access Control System for Your Organization Safety
Choose the Best Quality Access Control System for Your Organization SafetyChoose the Best Quality Access Control System for Your Organization Safety
Choose the Best Quality Access Control System for Your Organization SafetyNexlar Security
 
AssetManager interactive presentation
AssetManager interactive presentationAssetManager interactive presentation
AssetManager interactive presentationinfoserve365
 
AssetManager - downtime and production reporting
AssetManager - downtime and production reportingAssetManager - downtime and production reporting
AssetManager - downtime and production reportingOptima Control Solutions
 
Secure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control SystemSecure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control SystemNexlar Security
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityNexlar Security
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetyNexlar Security
 
Safeguard Your Business with The Latest Commercial Gate Entry Systems
Safeguard Your Business with The Latest Commercial Gate Entry SystemsSafeguard Your Business with The Latest Commercial Gate Entry Systems
Safeguard Your Business with The Latest Commercial Gate Entry SystemsNexlar Security
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesReslient Technologies
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareDevLabs Global
 

Semelhante a 21st Century Security Solutions in 40 Characters (20)

Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
Tensor Time and Attendance, Access Control, CCTV, HR and Visitor Management P...
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
Planning for a successful access control system installation
Planning for a successful access control system installationPlanning for a successful access control system installation
Planning for a successful access control system installation
 
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdfEnsure Next-level Safety With Our Home & Office Security Systems.pdf
Ensure Next-level Safety With Our Home & Office Security Systems.pdf
 
Ds next gen it monitoring
Ds   next gen it monitoringDs   next gen it monitoring
Ds next gen it monitoring
 
ONI_DatasheetRedesign_AssureMonitor_v3 (2)
ONI_DatasheetRedesign_AssureMonitor_v3 (2)ONI_DatasheetRedesign_AssureMonitor_v3 (2)
ONI_DatasheetRedesign_AssureMonitor_v3 (2)
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
Choose the Best Quality Access Control System for Your Organization Safety
Choose the Best Quality Access Control System for Your Organization SafetyChoose the Best Quality Access Control System for Your Organization Safety
Choose the Best Quality Access Control System for Your Organization Safety
 
AssetManager interactive presentation
AssetManager interactive presentationAssetManager interactive presentation
AssetManager interactive presentation
 
AssetManager - downtime and production reporting
AssetManager - downtime and production reportingAssetManager - downtime and production reporting
AssetManager - downtime and production reporting
 
Secure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control SystemSecure Your Business with Best Jersey Village Access Control System
Secure Your Business with Best Jersey Village Access Control System
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
Significance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization SafetySignificance of Quality Access Control System for Your Organization Safety
Significance of Quality Access Control System for Your Organization Safety
 
Safeguard Your Business with The Latest Commercial Gate Entry Systems
Safeguard Your Business with The Latest Commercial Gate Entry SystemsSafeguard Your Business with The Latest Commercial Gate Entry Systems
Safeguard Your Business with The Latest Commercial Gate Entry Systems
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient Technologies
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
 

21st Century Security Solutions in 40 Characters

  • 1. Security Solutions For The 21st Century __________
  • 2. 2 Advanced Access Security specializes in card access control security and monitoring for every level of need. From a one door small business to an enterprise system with multiple locations, thousands of employees, and the need for customization - we can meet all of your security system needs. Advanced Access state of the art software and hardware enables the highest level of customization and convenience for our clients. Advanced Access' management team and access control system has been providing card access control systems and security door solutions for an impressive array of businesses and organizations for the past 30 years. Our Story…
  • 3. 3 OUR SYSTEM Advanced Access’ system is a complete, enterprise-class access control and security management solution that offers unsurpassed ability to satisfy the requirements of any credential management, access control, or security situation. With a user interface that’s easy to operate and system features that deploy in any combination, Advanced Access easily fits the needs of any customer.
  • 4. 4 Flexible Platform: Advanced Access’ system offers a solution that is appropriate for any organization, including business, commercial, industrial government, healthcare, education, transportation, and more. Scalable Architecture: Whether you need a self- contained or distributed system, Advanced Access scales to any size, making it ideal for single or multi-site facilities, remote sites, campus settings, and multi- national organizations. Complete Solution: Our system offers a complete selection of in-demand features that integrate with standard and emerging technologies. You can deploy any combination of features: access control, alarm/event monitoring, intrusion detection, surveillance, elevator control, identification & credential management, photo imaging & badging, visitor management, reporting, and more.
  • 5. 5 Sustainable Future: Our forward-thinking design and commitment to sustainability means that allows Advanced Access’ customers to meet today’s challenges and expand as future needs arise. By maintaining long-term compatibility with existing technologies and keeping pace with rapid industry advancements, Advanced Access system provides a continuous path forward. Maximum Investment: Advanced Access’ system is a single-platform solution that can secure an entire facility. Choose the features you want now and implement additional features as your needs change. With Advanced Access, you are never locked into one decision, and you don’t need to discard major components when your system expands.
  • 6. 6 Protecting People, Assets, and AssistingWith Crisis Management Well Trained Staff Experience Expertise and Innovation Repeatability of Success Robust Systems Experience Expertise and Innovation Repeatability of Success 24/7 Operation Proven Processes Continuous Improvement Extensive StaffTraining
  • 7. 7 Our Major Services Managed Access Control Services Alarm Monitoring Services Managed Video Services Emergency Management Services
  • 8. 8 Enhancing Situational Awareness For Clients with Our Integrated Product Suite Product Functionality Action Access Control Alarm Coordination Alert Client Hosted Video Surveillance Real-Time Recordings Documented Evidence Emergency Management Client Safety Immediate Response
  • 9. 8000-0031 9 Monitor •User Friendly: Easy to monitor and evaluate situations with informative, color-coded messages, and prioritized alarm events. Advanced Access’ Operators can quickly respond to alarms and events. •Who’s In: This feature provides a real-time log of the cardholders in your facility or in a designated area. This provides a roll call report that is easily printed or viewed, helping the customer determine the status of persons. •Intrusion Detections: Monitor user-defined alarm points for security notification purposes. •Guard Tour: Track guard tour points by sequence, start/stop time, or by timed intervals. Detect •Device Status: Quickly determine the state of a device or door with dynamic text and graphic indicators. Command doors and devices through interactive command menus. •Email Notification: Selectively notify the appropriate personnel of alarms and activity. Advanced Access’ automated email notification feature sends selected events or alarms to appropriate personnel. •Photo Verification: Automatically call up a stored photo of the person presenting credentials for direct comparison by the customer, adding yet another level of security for your organization. Respond •Door Commander: Control a single door or a group of doors with the click of a mouse. Our staff or the customer can interactively override a lock or unlock-schedule, disable and pulse doors from context menus. •Alarm Point: All authorized personnel will have point-and- click control of alarm partitions, arm and disarm partitions, acknowledge and shunt incoming messages, and more. •Elevator Control: Call elevator cars and authorize access to selected floors, based on access privileges. •Door Properties: Utilize the Apple/Samsung phone application to pulse doors and override door lock & unlock schedules.
  • 10. 10 ONE.COMPREHENSIVE. SOLUTION. Mobile Application (iPhone & Android) Access Level Management Alarm Monitoring Elevator Monitoring 24/7 Emergency Assistance & Problem Reporting Card Administration Full Reporting Capability & Hosted History Custom Reports Software Upgrades Included
  • 11. 8000-0031 11 Import •Import / Export: Our system provides time-saving tools that simplify the task of importing people and cards into the Advanced Access database. Advanced Access can import and export data to and from personnel systems including SAP, Peoplesoft, and Man Power. •Personal Doors: Allows people to be independently assigned to doors when a unique set of privileges is needed. Use in communication with access groups and profiles to quickly add doors to a cardholder, or use the feature by itself to provide the simplest access privilege. This includes a convenient filtering utility that lets us and the client quickly locate the right door no matter how large your facility is. Schedule •Schedules: A click-and-drag interface with color coded time intervals makes creating a time schedule easy to understand and do. Special days and holidays can be assigned to any schedule, and they can be uniquely configured with their own active/inactive times. •Time & Attendance: Advanced Access’ time & attendance feature reports personnel attendance and hours worked in any size organization. •Access Rules: Advanced Access provides the ultimate flexibility in creating simple or complex access rules. Apply them to doors or personnel in a grouped or individual manner. Control •Cardholders: Extensive user- intuitive options for enrolling and managing cardholders and their credentials. You can enroll multiple cards and biometric credentials for each cardholder. Independently control card behaviors and access privileges. It’s easy to add photographs, badges, and data that pertain to each cardholder and their role within your organization. We provide numerous data types that make it simple to manage credentials and access privileges, as well as control report filtering. •Reports: Track personnel and operator activity with our extensive selection of reports. These include alarm, door/card activity, who’s-in/roll-call, auditing and many more.
  • 12. 12 CuttingEdge Technology 100% Web Based Smart Phone App (iPhone & Android): Control Your Facility From Anywhere In The World Easy-To-Use Biometric Integration Smart-Card Support Easily Customized Customized Card Access Control CCTV and IP-Cameras Real-Time Facility Alarm via Digital Map Mass Notification Integration Crisis Mode Customization Options Wireless Door and Motion Detection Integration
  • 13. 13 Filter •Authorized Personnel Privileges: Advanced Access offers a rich set of filters and privileges that can be assigned in any combination. You can easily control which screens and features each authorized personnel can see or use an individual basis. This way can create unique boundaries for authorized personnel who serve different roles and ranks; like property managers, security officers, badging operators, and any other authorized personnel. Also you can manage login and password renewals with finite control. Manage •Credential Management: Advanced Access offers a versatile credentialing solution that combines card enrollment, biometric identification, photo- capture & ID badging, and visitor management capabilities. Provide the added security and safety your organization desires by choosing from any combination of credentialing features. Grow •Scalability: Most card access systems are relatively simple to program and operate, until the number of readers reaches 8 to 10, or beyond. Once that barrier has been reached, many of the of the other systems become sluggish in their operation and much more cumbersome to program, such as assigning cards to specific readers at specific times of operation. Our system design allows a 300-reader system to be as easy to program as a 3-reader system.
  • 14. 14 Product Capabilities… Security Access Control Duress Intrusion Surveillance Alarms and Alerts Cardholder Management Badge Design & Printing Mass Notification Intercoms Reporting Facility Asset Tracking Scheduling Mass Notification Maintenance Reporting Special Features High Speed Operation Remote Access Mobile Access (Smart Phone Apps Ease of Use Ease of Configuration Email, Text and Phone Notification User Administration
  • 15. 15 Capture •Photo Imaging & Badging: Create professional, durable ID Cards and badges using any combination of graphics, logos, photos and data. Customize badge designs to distinguish between employees, vendors, visitors, etc. •Visitor Management: Advanced Access’ visitor management feature allows clients to verify, screen, and badge visitors to their facility. The system performs live background checks, directory linking, and versatile e-mail capabilities. Design •Card/Badge Enrollment: Advanced Access performs card enrollment, credential management, and badge printing from the same screen. •Log-on Security & Authorized Personnel Privileges: The Access web-client authentication logon based on the same privileges and operator filters as the Advanced Access server, offering the ability to hide, view, and edit system data based on individual logons. Identify •Biometric Enrollment: Advanced Access integrates fully with the foremost biometric technologies, providing the capability to capture, compare, encode, and load finger templates within the Advanced Access system. Advanced Access provides any combination of identification and authentication, and is able to store biometric data in the reader and/or on the smart card. •Photo Dossier: This feature allows authorized personnel to pull the latest cardholder data along with stored photos and demographic information in a quick and consolidated form for viewing or printing.
  • 16. 16 Why Advanced Access? Access excellence offers peace of mind Total security solution bundled into one, easy to manage package Convenient hand-held solutions to make monitoring, detecting, and reacting simple and efficient Support team committed to bringing you unparalleled customer service and a personal relationship with our clients
  • 17. 17 Why Advanced Access? Our 100% web based, virus-proof software utilizes a secure filtering environment in its Web server, which is impervious to viruses because of its internal design. It is resistant to hackers because of enhanced security measures built into the filter and the proprietary nature of the filter itself - factors that are significant when analyzing network and system security. In addition, our software is very stable; systems failure rates are infinitesimal, when compared to typical Windows® based platforms. •Our Interactive Facility Mapping software has a powerful interface allowing a system user to access a facility map from a PC or even a smartphone to control access points (secured doors/windows) and watch surveillance cameras.
  • 18. 18 Why Advanced Access? Advanced Access system was established to bring innovative solutions to the security market. Since, 1984, our system has maintained an unwavering commitment to excellence in developing access control and security management solutions that seamlessly integrate with advancing technology from leading industry partners. Dedication to product development is only part of the business philosophy at Advanced Access. All Advanced Access products are manufactured in the United States to rigorous military standards for the utmost quality and reliability. Advanced Access also offers total support to its customers through an extensive network of highly trained technicians. Corporate Commitment to Excellence
  • 19. 19 Team Capabilities Include: •Design & Build Customization •Needs Analysis •Program/Project Management •Project Engineering •Training •Value Engineering Hardware & Software Design Capabilities: •Product Design •Backward Compatibility •Obsolescence Management •Design Verification Testing •Manufacturing •Manufacturing Test •Documentation •Implementation •Support Capabilities
  • 20. 20 A Track Record of Success • Our Equipment and Software designed by our team has been in the field for over 30 years, and installed in hundreds of facilities in the continental US and overseas. • Equipment has been in the field for over 10 years without failure or replacement. • Advanced Access’ System is used in mission-critical solutions in the Federal Government, Top Secret Facilities, Public Schools, Universities, and DOD Clients. • Advanced Access’ products are designed to exceed UL, approval, and other agency approvals.
  • 21. SUPPORTED TECHNOLOGES INCLUDE: 21 Standard Cards Proximity 125KHz Barcode Magnetic Stripe Smart Cards HID iClass MIFARE MIFARE DESFire MIFARE DESFire EVI US Government Compliant HSPD-12 & FIPS 201 Compliant FICAM Approved APL Certification Number 10060 PIV, PIV-II, TWIC cards CAC-Legacy, Transition, Endpoint Option to perform PKI challenge to the Personal Certificate (PAK)
  • 22. Advanced Access Would Like To Thank You For Your Time and Consideration! Please visit us at 22